Showing posts with label cyber crime. Show all posts
Showing posts with label cyber crime. Show all posts

Friday, 23 February 2018

What Is Cyberbullying and how to prevent it?

What Is Cyberbullying

Cyberbullying is tormenting that happens over digital gadgets like phones, PCs, and tablets. Cyberbullying can occur through SMS, Text, and applications, or online in web-based social networking, gatherings, or gaming where individuals can see, partake in, or share content. Cyberbullying includes sending, posting, or sharing negative things like images,post,anything related about another person which could harm him socially. It can incorporate sharing individual or private data about another person causing shame or embarrassment. Some cyberbullying goes too far into unlawful or criminal conduct.

Mostly cyberbullying occurs on where people are more active like:
  1. Online networking sites like Facebook, Instagram, Snapchat, and Twitter
  2. SMS (Short Message Service) otherwise called Text Message sent through gadgets
  3. Text (by means of gadgets, email supplier administrations, applications, and online networking informing highlights)
  4. Email

Special Points :-


With the pervasiveness of online networking and advanced gatherings, remarks, photographs, posts, and substance shared by people can frequently be seen by outsiders and additionally associates. The substance an individual offers online – both their own substance and also any negative, mean, or terrible substance – makes a sort of changeless open record of their perspectives, exercises, and conduct. This open record can be thought of as an online notoriety, which might be available to schools, businesses, universities, clubs, and other people who might look into an individual now or later on. Cyberbullying can hurt the online notorieties of everybody included – not only the individual being harassed, but rather those doing the tormenting or taking an interest in it. Cyberbullying has novel worries in that it can be:

Diligent – Digital gadgets offer a capacity to immediately and continuously impart 24 hours every day, so it can be troublesome for kids encountering cyberbullying to discover alleviation.

Changeless – Most data imparted electronically is perpetual and open, if not detailed and expelled. A negative online notoriety, including for the individuals who spook, can affect school affirmations, business, and different regions of life.

Difficult to Notice – Because instructors and guardians may not catch or see cyberbullying occurring, it is harder to perceive.

Be Aware of What Kids Doing Online


A kid might be associated with cyberbullying in a few ways. A youngster can be harassed, domineering jerk others, or witness tormenting. Guardians, instructors, and different grown-ups may not know about all the advanced media and applications that a youngster is utilizing. The more advanced stages that a kid utilizes, the more open doors there are for being presented to potential cyberbullying.

How to prevent cyberbullying?


In the event that you see cautioning signs that a might be associated with cyberbullying, find a way to explore that youngster's computerized conduct. Cyberbullying is a type of harassing, and grown-ups should adopt a similar strategy to address it: bolster the tyke being tormented, address the harassing conduct of a member, and show kids that cyberbullying is considered important. Since cyberbullying happens on internet, reacting to it requires diverse approach. In the event that you feel that a kid is engaged with cyberbullying, there are a few things you can do:


1.Notice – Recognize if there has been an change in state of mind or conduct and investigate what the reason may be. Endeavor to decide whether these changes happen around a child’s use of their digital devices.


2.Talk – Ask inquiries to realize what is going on, how it began, and who is included.

3.Document – Keep a record of what is going on and where. Take screen captures of hurtful posts or substance if conceivable. Most laws and approaches take note of that harassing is a rehashed conduct, so records help to archive it.


4.Report – Most web-based social networking stages and schools have clear strategies and revealing procedures. In the event that a colleague is cyberbullying, report it to the school. You can likewise contact application or online networking stages to report hostile substance and have it expelled. In the event that a youngster has gotten physical dangers, or if a potential wrongdoing or unlawful conduct is happening, report it to the Indian cyber army on there cyber crime helpline number .

5.Support – Peers, tutors, and trusted grown-ups can once in a while intercede freely to decidedly impact a circumstance where negative or destructive substance posts about a kid. Open Intervention can incorporate posting constructive remarks about the individual focused with harassing to attempt to move the discussion in a positive course. It can likewise connect with the kid who is harassing and the objective of the tormenting to express your worry. On the off chance that conceivable, endeavor to decide whether more expert help is required for those included, for example, talking with a guidance counselor or mental health professional.

About Indian cyber army


Indian Cyber Army-Infosec Awareness Training will always provide you tips and ways for the teenagers/students for online safety and always make you aware of cyber threats. If you need any cyber awareness session contact to Indian cyber army an association of ethical hackers,working on mission to remove cyber crime from India and started its cyber crime helpline number 9968600000 If you become a cyber victim just contact us we are there to help you and also providing ethical hacking training to students to prepare a team so that they could work for the country and can fought against cyber criminals.

Stop !! Revenge Porn

Revenge porn, referred to all the more formally as requital smut (and informally as 'sextortion'), includes the dispersion of sexually express pictures or recordings, without assent of the people portrayed. Vengeance porn is regularly utilized as a way to extort people into performing sex acts or proceed with a relationship- - or similarly as a way to hurt a man's notoriety. Numerous VIPs, have been casualties of requital porn posted by previous critical others. Measures have been rendered against revenge porn. Online networking destinations like Facebook have begun to take activities to proactively identify and stop the spread of Revenge porn. Enactment has likewise been proposed to criminalize the posting of naked pictures without the assent of the people portrayed. Destinations committed to the posting of reprisal porn have been closed down and there is a developing mindfulness and development to stop the spread of revenge porn.


The obsession of revenge in this man prevails in the person so that he goes to the extent that he can do as much as he can for his partner. In it, it has to do more harm to its purpose. It uses photos from your personal moments to videos. Someone falls down to the extent that he takes the path to acid and murder to hurt his partner

Psychologists, on this issue, say, "This is a kind of online exploitation in which people bring personal images or videos of their partners to everyone. If any personal life is brought to the public platform, except None of embarrassment is achieved

.

Purpose of Revenge Porn

The main purpose of the person in revenge porn is to waste the life of the  partner. But sometimes these personal photos and videos are used by the boys to blackmail their Parternes so that they return to him.


Reasons for Depression and Suicide

Sometimes, revenge porn becomes a cause for depression and suicide. Love is the confidence itself, and because of this trust, the private moment spent with the lover becomes public after the breakup and the fingers are raised on the character of the girls. Recently, a boy demanded nude video chat and blackmailed him for the removal of old photographs from his girlfriend. The troubled girl uploaded  her problem on a website, after that case has opened

The effect of Revenge Porn is more than embarrassment and trauma, people who can not tolerate it often suffer from depression, social isolation and attempt suicide too (many are also successful)

Assume statistics

According to NCRB data of 2014, cyber crime has increased by 63.7%. And the circulation of such porn content increased by 104.2%.There was a 6% ascend in the quantity of cybercrime occurrences recorded in 2016, when contrasted with the earlier year, with Uttar Pradesh recording the most extreme number of cases.

  • Revenge porn victims are most women, about 90%

  • 93% of the victims say that after being victimized, they are emotionally broken down completely.

  • 49% of the victims said that after their photographs came online people tortured them mentally and harassed them.

Safety tips for Revenge porn

  • The most secure approach to maintain a strategic distance from a photo getting into the wrong hands is to never take it, enable it to be taken, or share it. Tragically, there are cases (now and then called "exact retribution porn") where somebody shares pictures implied just for them — now and again after a separation.

  • Never take and send a picture of yourself since you were influenced, even from somebody you think about.

  • On the off chance that an outsider (or perhaps even somebody you know) requests that you take a noteworthy picture, it could be a trick that could prompt further requests and dangers ("sextortion"). Try not to react and think about revealing it to the police and the cyber crime helpline number 9968600000. It could be a criminal who has abused other individuals so you're helping other people by alarming experts.

  • On the off chance that somebody posts, circulate or debilitate to disperse bare, insinuate or sexually unequivocal pictures of you without your consent, consider reaching law requirement or a lawyer. Numerous states have laws particularly intended to indict "exact retribution porn" cases and to ensure and repay casualties.

  • Consider reaching a casualty hotline or support administration, for example, the Cyber Civil Rights Initiative or the National Organization for Victim Assistance. On the off chance that a minor is a casualty, contact the National Center for Missing and Exploited Children.

  • In the event that a minor (individual under 18) is portrayed in the picture, it could be considered "kid erotic entertainment," which can be an intense wrongdoing, particularly if a grown-up is included or if there is any kind of pressure.

About Indian Cyber Army

Indian Cyber Army-Cyber Awareness Training will dependably give you tips and approaches to the adolescents/understudies for online security and dependably make you mindful of digital dangers. In the event that you require any digital mindfulness session contact to Indian digital armed force a relationship of moral hackers, working on mission to expel digital wrongdoing from India and began its digital cyber crime helpline number 9968600000 If you turn into a digital casualty simply get in touch with us we are here to help you and furthermore giving ethical hacking training to understudies to set up a group so they could work for the nation and can battled against Internet Crime or cyber crimes.

Wednesday, 7 February 2018

PsyOps - Major cyber security issue & how to stay safe

Another major cyber security issue is PSYOP.The essential parts of present day psychological activities (PSYOP), have been known by numerous different names or terms, including MISO, PsyOps, political fighting, "Hearts and Minds", and propaganda.The term is utilized "to mean any activity which is drilled for the most part by mental strategies with the point of bringing out an arranged mental response in different people".Various methods are utilized, and are gone for affecting an intended interest group's esteem framework, conviction framework, feelings, thought processes, thinking, or conduct. It is utilized to incite admissions or fortify mentalities and practices great to the originator's targets, and are at times joined with dark tasks or false banner strategies. It is additionally used to devastate the confidence of adversaries through strategies that plan to discourage troops' mental states.Target gatherings of people can be governments, associations, gatherings, and people, and isn't simply restricted to warriors. Regular people of remote domains can likewise be focused by innovation and media to cause an impact in the legislature of their nation.


How to stay safe ?

Abstain from following pages that hope to spread spams in your news encourage. Try not to tap on joins which are not from any enlisted and confided in source. Try not to fall prey to any endeavor to get your data. Autolike bots, auto supporter bots, and other such stuff ought to be at any and each cost.
If you still need any help on any issue regarding cyber related problems just contact us on our cyber crime helpline number 9968600000.

Ethical Hacking & Cybercrime Investigation Integrated training program

After the successful completion of Summer Internship Indian Cyber Army is live with 45 day (Weekdays – 2hrs.) OR (Sunday/Saturday– 4hrs....